Generating Payloads of Power Monitoring Systems Compliant with Power Network Protocols Using Generative Adversarial Networks
Hao Zhang,
Ye Liang,
Jun Zhang,
Jing Wang,
Hao Zhang,
Tong Xu and
Qianshi Wang ()
Additional contact information
Hao Zhang: State Grid Jibei Electric Power Company Limited, Tangshan 063000, China
Ye Liang: Beijing Kedong Electric Power Control System Co., Ltd., Beijing 100192, China
Jun Zhang: State Grid Jibei Electric Power Company Limited, Tangshan 063000, China
Jing Wang: Beijing Kedong Electric Power Control System Co., Ltd., Beijing 100192, China
Hao Zhang: State Grid Jibei Electric Power Company Limited, Tangshan 063000, China
Tong Xu: State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
Qianshi Wang: State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
Energies, 2024, vol. 17, issue 20, 1-19
Abstract:
In the network environment of power systems, payload generation is used to construct data packets, which are used to obtain data for the security management of network assets. Payloads generated by existing methods cannot satisfy the specifications of the protocols in power systems, resulting in low efficiency and information errors. In this paper, a payload generation model, LoadGAN, is proposed by using generative adversarial networks (GANs). Firstly, we find segmentation points to cut payloads into different segment sequences using sliding window schema based on Bayesian optimization. Then, we use different payload segments to train several child generators to generate corresponding parts of a whole payload. Segment sequences generated by these generators are assembled to form a whole new payload that is compliant with the specifications of the original network protocol. Experiments on the Mozi botnet dataset show that LoadGAN achieves precise payload segmentation while maintaining a high payload effectiveness of 85.5%, which is a 40% improvement compared to existing methods.
Keywords: security management of network assets; network protocols; generative adversarial networks; payload; Bayesian optimization (search for similar items in EconPapers)
JEL-codes: Q Q0 Q4 Q40 Q41 Q42 Q43 Q47 Q48 Q49 (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1996-1073/17/20/5068/pdf (application/pdf)
https://www.mdpi.com/1996-1073/17/20/5068/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jeners:v:17:y:2024:i:20:p:5068-:d:1496924
Access Statistics for this article
Energies is currently edited by Ms. Agatha Cao
More articles in Energies from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().